Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <21218.18131.870738.776866@gargle.gargle.HOWL>
Date: Fri, 24 Jan 2014 11:56:19 +0100
From: rf@...eap.de
To: oss-security@...ts.openwall.com
Subject: Re: linux-distros membership

>>>>> "RF" == rf  <rf@...eap.de> writes:

>>>>> "MM" == Moritz Muehlenhoff <jmm@...ian.org> writes:
    MM> We maintain the http://anonscm.debian.org/viewvc/kernel-sec/
    MM> repository which tracks all kernel vulnerabilities as soon as
    MM> they're public. That's a good base for every Debian-derived
    MM> distro with a modified kernel.

    RF> Sounds interesting. How am I supposed to extract information
    RF> from this page? Are there some docs about how to use it?

OK, think I got the basic idea. However, judging from a few CVE examples
on the site, it seems there is no time advantage in using this site as
compared to posts on this list. In fact the entries appear a couple of
days later in some cases. So I'm afraid this won't be of too much help
concerning the timing issue.

Roland

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.